2025-04-01
Fastly
#hugops for vibe coders
Schneier on Security
Cell Phone OPSEC for Border Crossings
Github Security Blog
GitHub found 39M secret leaks in 2024. Here’s what we’re doing to help
Microsoft Security
Transforming public sector security operations in the AI era
Datadog HQ
This Month in Datadog - March 2025
Elastic Security Labs
Outlaw Linux Malware: Persistent, Unsophisticated, and Surprisingly Effective
Hunt and Hackett
The Evolving Threat of OT: Do You Know Your Weak Spots?
Mozilla Security
Updated GPG key for signing Firefox Releases
The Citizen Lab
Gender-Based Digital Transnational Repression and the Authoritarian Targeting of Women in the Diaspora
Dark Reading
Google Brings End-to-End Encryption to Gmail
Dark Reading
Check Point Disputes Hacker's Breach Claims
Palo Alto Networks
Platformization Maximizes Security Efficacy & IT Operations Efficiency
Compass Security Blog
I wannabe Red Team Operator
2025-03-31
Schneier on Security
The Signal Chat Leak and the NSA
Malwarebytes
Why we’re no longer doing April Fools’ Day
Malwarebytes
A week in security (March 24 – March 30)
Microsoft Security
Analyzing open-source bootloaders: Finding vulnerabilities faster with AI
Microsoft Security
New innovations in Microsoft Purview for protected, AI-ready data
Kevin Beaumont
Oracle attempt to hide serious cybersecurity incident from customers in Oracle SaaS service
White Knight Labs
Windows Kernel Buffer Overflow
Meta Security
Mobile GraphQL at Meta in 2025
Dark Reading
Oracle Cloud Users Urged to Take Action
Dark Reading
Trend Micro Open Sources AI Tool Cybertron
Dark Reading
Qakbot Resurfaces in Fresh Wave of ClickFix Attacks
Bishop Fox Security
Epic Fails and Heist Tales: A Red Teamer’s Journey to Deadwood
Krebs on Security
How Each Pillar of the 1st Amendment is Under Attack
2025-03-30
Troy Hunt
Weekly Update 445
Ars Technica Security
FBI raids home of prominent computer scientist who has gone incommunicado
2025-03-28
Schneier on Security
Friday Squid Blogging: Squid Werewolf Hacking Group
Schneier on Security
AIs as Trusted Third Parties
Amazon Security
AWS continues to support government cloud security and shape FedRAMP’s evolution toward automated compliance
Ars Technica Security
Oracle has reportedly suffered 2 separate breaches exposing thousands of customers‘ PII
Ars Technica Security
Gemini hackers can deliver more potent attacks with a helping hand from… Gemini
Dark Reading
GSA Plans FedRAMP Revamp
Dark Reading
Evilginx Tool (Still) Bypasses MFA
Dark Reading
Oracle Still Denies Breach as Researchers Persist
Dark Reading
Harmonic Security Raises $17.5M Series A to Accelerate Zero-Touch Data Protection to Market
Dark Reading
SecurityScorecard 2025 Global Third-Party Breach Report Reveals Surge in Vendor-Driven Attacks
Dark Reading
Malaysia PM Refuses to Pay $10M Ransomware Demand
Dark Reading
Navigating Cyber-Risks and New Defenses
Palo Alto Networks
Addressing Federal Cybersecurity Challenges in the Cloud Era
TrustedSec
MCP: An Introduction to Agentic Op Support
Searchlight Cyber
Russian Zero-Day Seller Offers $4m For Exploits in Telegram
2025-03-27
Schneier on Security
A Taxonomy of Adversarial Machine Learning Attacks and Mitigations
Malwarebytes
“This fraud destroyed my life.” Man ends up with criminal record after ID was stolen
Malwarebytes
Moving from WhatsApp to Signal: A good idea?
Dark Reading
Hoff's Rule: People First
Dark Reading
How CISA Cuts Impact Election Security
Dark Reading
Fake DeepSeek Ads Spread Malware to Google Users
Dark Reading
High-Severity Cloud Security Alerts Tripled in 2024
Google Security Blog
New security requirements adopted by HTTPS certificate industry
Zero Day Initiative
MindshaRE: Using Binary Ninja API to Detect Potential Use-After-Free Vulnerabilities
Krebs on Security
When Getting Phished Puts You in Mortal Danger
Palo Alto Networks
Is Your Browser Ground Zero for Cyberattacks?
2025-03-26
Malwarebytes
Security expert Troy Hunt hit by phishing attack
Amazon Security
Enhancing cloud security in AI/ML: The little pickle story
Dark Reading
Cybersecurity Gaps Leave Doors Wide Open
Dark Reading
Beyond STIX: Next-Level Cyber-Threat Intelligence
Dark Reading
New Testing Framework Helps Evaluate Sandboxes
Google Security Blog
Titan Security Keys now available in more countries